IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
1 - 25 of 1615 Matches Previous Page  |  Next Page
How to Secure your Network Smarter and Faster
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Next-Generation Firewalls: The Cornerstone of Future Security
sponsored by Palo Alto Networks
WHITE PAPER: Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Palo Alto Networks

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

Amazon Web Services: Automatically Scale Cloud Security
sponsored by AWS - Fortinet
WHITE PAPER: This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud
sponsored by AWS - Fortinet
WHITE PAPER: Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.
Posted: 17 Nov 2017 | Published: 30 Apr 2017

AWS - Fortinet

Design and deliver cloud-based apps and data for flexible, on-demand IT
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

Discover an Advanced Cloud-Based Threat Prevention Suite
sponsored by Juniper Networks, Inc.
WHITE PAPER: Inside learn about Sky Advanced Threat Prevention, a cloud-based service that provides advanced malware protection built to adapt to the ever-changing threat landscape, and give you the level of protection needed to fend off today's ransomware and DDoS attacks.
Posted: 16 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Preparing for the New OWASP Top 10 and Beyond
sponsored by F5 Networks
WHITE PAPER: Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.
Posted: 16 Nov 2017 | Published: 31 Oct 2017

F5 Networks

The Complete Guide to Building a Security Culture
sponsored by Trustwave
WHITE PAPER: IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Trustwave

Securing Azure Active Directory: Detection and Alert
sponsored by Quest
WHITE PAPER: Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Quest

The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

Building Effective Azure Active Directory Practices
sponsored by Quest
WHITE PAPER: In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Quest

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Securing Operational Technology in the Pharmaceutical and Chemical Manufacturing Industries
sponsored by Bayshore Networks
WHITE PAPER: In this white paper, gain a stronger understanding of the cyber security implications of IoT devices in pharmaceutical and chemical manufacturing. Uncover 4 key considerations for protecting against cyber threats when leveraging the IIoT.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Bayshore Networks

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

Preparing for the General Data Protection Regulation
sponsored by Fortinet, Inc.
WHITE PAPER: Gain a stronger understanding of GDPR compliance and implications for your network security.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

Healthtech And Security: Sharing And Safeguarding Patient Data
sponsored by Absolute
WHITE PAPER: Learn more about how to prevent cybercriminals from accessing your patient's electronic medical records in Aberdeen Group's HealthTech study.
Posted: 19 Oct 2017 | Published: 31 Mar 2017

Absolute

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks
1 - 25 of 1615 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement